Compass IT Compliance Blog

IT Risk Assessments and the SANS Top 20

IT Risk Assessments and the SANS Top 20

No matter what industry you are in, conducting a thorough IT Risk Assessment is critical to your organization for a number of reasons. First, it gives you a point in time measurement of how your IT Security posture compares to either various regulations or IT Security Frameworks.

Read Story

Social Engineering - What You Need to Know

Black and red cartoon bugs attack code

For those of us in the Information Security world, we hear terms thrown around all the time that are often interchanged, confused, and sometimes misused. One of those terms is Social Engineering. On the surface, this is a confusing term that doesn't appear to have anything to do with …

Read Story

Social Engineering - Mitigating Your Risk

Social Engineering - Mitigating Your Risk

As we look into 2016 and what trends are going to take place this year in the world of Information Security, there is one thing that we can predict with significant confidence: Employees will remain the biggest threat to your Information Security Program and ultimately the safety of t …

Read Story

IT Security in 2016: What Comes Next?

A keyhole within a line of code

The last several years in IT Security have been full of surprises as well as the fulfillment of predictions that have been made. If you recall back to 2014, the famed credit card breaches that took place were predicted by most and ultimately held true to form. We had a rash of major b …

Read Story

The HIPAA Risk Assessment: The First Step in a Long Journey

The HIPAA Risk Assessment: The First Step in a Long Journey

Every year, experts make predictions on what the following year is going to hold in terms of trends in the cybersecurity industry, what new threats we might face, and what impacts those threats might have on the average person. For years we heard about credit card security and the ass …

Read Story

FFIEC Guidance: Revision vs. Update

FFIEC Guidance: Revision vs. Update

When it comes to technology, we hear of terms that are often times confused and interchanged. Some examples of these terms might include Vulnerability Scanning and Penetration Testing. Another example might be the age old debate of Risk Assessment versus Audit. While seemingly similar …

Read Story

Subscribe by email